![Accounting Information Systems](https://www.bartleby.com/isbn_cover_images/9781133934400/9781133934400_largeCoverImage.gif)
Accounting Information Systems
9th Edition
ISBN: 9781133934400
Author: James A. Hall
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 16, Problem 3MCQ
To determine
Identify the option which is done to facilitate the restarting of a checkpoint procedure.
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b. data input errors.c. the failure to have all input data ready on time.d. computer operator intervention.e. echo check failures.
Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully captures
A sales transaction was coded with an invalid customer account
code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not
detected until the updating run when it was found that there was
no such account to which the transaction could be posted. A
control procedure that would serve as a preventive control for this
situation would be:
Select one:
O a. Hash total
O b. Check digit
O c. Validity test
O d. Either B or C
Chapter 16 Solutions
Accounting Information Systems
Ch. 16 - Prob. 1RQCh. 16 - Prob. 2RQCh. 16 - Prob. 3RQCh. 16 - Prob. 4RQCh. 16 - Prob. 5RQCh. 16 - Explain discretionary access privileges.Ch. 16 - Prob. 7RQCh. 16 - Prob. 8RQCh. 16 - What is a vaccine, and what are its limitations?Ch. 16 - Prob. 10RQ
Ch. 16 - Prob. 11RQCh. 16 - What are the risks from equipment failure?Ch. 16 - Prob. 13RQCh. 16 - Prob. 14RQCh. 16 - Prob. 15RQCh. 16 - Prob. 16RQCh. 16 - Prob. 17RQCh. 16 - Prob. 18RQCh. 16 - Prob. 19RQCh. 16 - Prob. 20RQCh. 16 - Prob. 21RQCh. 16 - Prob. 22RQCh. 16 - Prob. 1DQCh. 16 - Prob. 2DQCh. 16 - Prob. 3DQCh. 16 - Prob. 4DQCh. 16 - Prob. 5DQCh. 16 - Prob. 6DQCh. 16 - Prob. 7DQCh. 16 - Prob. 8DQCh. 16 - Prob. 9DQCh. 16 - Prob. 10DQCh. 16 - Prob. 11DQCh. 16 - Prob. 12DQCh. 16 - Prob. 13DQCh. 16 - End-user computing has become extremely popular in...Ch. 16 - Prob. 15DQCh. 16 - Prob. 16DQCh. 16 - Prob. 17DQCh. 16 - Prob. 18DQCh. 16 - Prob. 19DQCh. 16 - Prob. 20DQCh. 16 - Prob. 21DQCh. 16 - Prob. 22DQCh. 16 - Prob. 23DQCh. 16 - Prob. 24DQCh. 16 - Prob. 25DQCh. 16 - Describe a digest within the context of a digital...Ch. 16 - What is a digital envelope?Ch. 16 - Prob. 28DQCh. 16 - Prob. 29DQCh. 16 - Prob. 30DQCh. 16 - Prob. 31DQCh. 16 - Discuss the unique control problems EDI creates.Ch. 16 - Prob. 33DQCh. 16 - Prob. 34DQCh. 16 - Prob. 1MCQCh. 16 - Prob. 2MCQCh. 16 - Prob. 3MCQCh. 16 - Prob. 4MCQCh. 16 - Prob. 5MCQCh. 16 - Prob. 6MCQCh. 16 - Prob. 7MCQCh. 16 - Prob. 8MCQCh. 16 - Prob. 9MCQCh. 16 - Prob. 10MCQCh. 16 - Prob. 1PCh. 16 - Prob. 2PCh. 16 - Prob. 3PCh. 16 - Prob. 4PCh. 16 - Prob. 5PCh. 16 - Prob. 6PCh. 16 - Prob. 7PCh. 16 - Prob. 8PCh. 16 - Better Business Company (BBC) is in the process of...Ch. 16 - Prob. 10PCh. 16 - Prob. 11PCh. 16 - Prob. 12PCh. 16 - Prob. 13P
Knowledge Booster
Similar questions
- Which of the following is true of the correcting entry method? a.It cannot be used to correct a manual entry. b.It cannot be used to correct computerized entry. c.It can be used only to correct an error before posting has taken place. d.It can be used to correct both manual and computerized entries.arrow_forwardWhat is the control issue related to reentering corrected error records into a batch processing system? What are the two methods for doing this?arrow_forwardIf detective controls signal error flags, why shouldn’t this type of controls automatically make a correction in the identified errors? Why are corrective controls necessary?arrow_forward
- An employee in the receiving department keyed in a shipment from a remote terminal and inadvertently omitted the purchase order number. The best systems control to detect this error would be aa. batch total.b. completeness test.c. sequence check.d. reasonableness test.e. compatibility test.arrow_forward1. For each occurrence below identify the policy(ies), practice(s), or procedure(s) that would be most effective in addressing the error or irregularity. For each control you identify, indicate (1) if it is a preventive, detective, or corrective control, and (2) which of the four internal control objectives is addressed.a. A computer hardware component malfunctions during a processing run, causing many of the accounts receivable records to be lost. b. A five-minute power failure causes the computer system to cease functioning, thus resulting in the loss of data being transmitted from several terminals. c. During a violent electrical storm, an employee was keying data at one of the computers in the order entry department. After about an hour of data entry, lightning caused a company-wide power failure. When power was restored, the employee had to re-key all the data from scratch. d. An inexperienced computer operator mounts the accounts receivable master file (on magnetic tape reel) for…arrow_forwardWhich of the following is NOT a test for identifying application errors? a. reconciling the source code b. reviewing test results c. retesting the program d. testing the authority tablearrow_forward
- Categorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response techniquearrow_forwardwhich is true about vendor files? A. They must be cleaned on a daily basis B. They can be in electronic or paper form C. They do not need maintenance D. Duplicate records do not need to be removedarrow_forwardWhich of the following statements most likely represents a control consideration for anentity that performs its accounting using mobile computing devices?a. It is usually difficult to detect arithmetic errors.b. Unauthorized persons find it easy to access the computer and alter the data files.c. Transactions are coded for account classifications before they are processed on thecomputer.d. Random errors in report printing are rare in packaged software systems.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619202/9781337619202_smallCoverImage.gif)
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337619455/9781337619455_smallCoverImage.gif)
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning